10 years of experience in incident response in Russian Federation 12-17 June 2011 Vienna
About • 1998. Start as RIPN (Russian Institute of Public Networks) project 1998 as CSIRT of RBNET (NREN) • FIRST, TI member • 2011. RU-CERT - non-commercial organization that plays a role of a national level CSIRT team of Russian Federation • Hours of work - 10:00-18:00 every day, except weekends and national holidays • Responsibility domain – whole Russian address space • Funding model - sponsorship 12-17 June 2011 Vienna
OPERATIONAL DETAILS Environment - reality • No authority over ISPs, domain registrars, etc. • No IP resources under control Mode of operation 1. Gathering (getting) all the information about malicious Russian resources and network activity related to Russian address space 2. Information analysis and verification 3. Attempting to solve the problem 12-17 June 2011 Vienna
Mode of operation (continued) Resource owner E-Mails contact Phone calls Authority Feeds contact 12-17 June 2011 Vienna
Another operational mode • Dispatching urgent requests to Russian LEA Requests direction 1. Foreign countries -> Russia 95% 2. Russia -> Foreign countries 1% 3. Russia -> Russia 4% 12-17 June 2011 Vienna
INPUT details Incidents processed All kinds of «typical» incidents, except SPAM cases 12-17 June 2011 Vienna
Feed sources • Arbor Networks • Shadowserver • Abuse.ch bundle • Malwaredomainlist • CleanMX • Phishtank • Malc0de • Team Cymru • Some other ’ s (3-4, incl. temporary) 12-17 June 2011 Vienna
Feed data volume (average/ per day) Type New Unique Summary Phishing 62 176 199 MW 250 508 523 C&C 4 31 32 12-17 June 2011 Vienna
Top list of e-mails input (5 months) MW Phishin Attack g s mycert@mycert.org. 126 105 my auscert@auscert.org. 219 6 au ftsteam@paypal.com 14 189 cert@cert.br 100 68 csirt@bradesco.com. 70 34 br @markmonitor.com 76 19 @brandprotect.com 32 83 12-17 June 2011 Vienna cais@cais.rnp.br 65
СС /TO balance statistic RU-CERT RU-CERT in TO in СС field field mycert@mycert.org.my 110 121 auscert@auscert.org.au 17 208 ftsteam@paypal.com 4 198 cert@cert.br 168 csirt@bradesco.com.br 104 24 @markmonitor.com 67 14 @brandprotect.com 92 23 cais@cais.rnp.br 65 afcc@rsa.com 57 12-17 June 2011 Vienna
Information processing Security event – any information related to computer security case Incident – SE, that RU-CERT reacts to in some way 12-17 June 2011 Vienna
Will SE be transformed into Incident or not significantly depends on results of verification: Phishing • 95-98% of all requests are really phishing resources • ~80% of phishing resources are located on compromised servers • Second level domains used for phishing sites – lately occurs very seldom • Most cases - non-Russian banks and payment systems Malware 70-75% can be verified (MHR, etc) Attacks Unverified C&C 10-15% can be verified 12-17 June 2011 Vienna
Contact details 1. Resource owners – more than 600 contacts in RU- CERT database 2. LEA ’ s – 3-4 с ases/per month 3. CCTLD (Coordination Center of Russian TLD zone) (domains in .ru/. рф zones) Monitoring model 12-17 June 2011 Vienna
Incident processing software 12-17 June 2011 Vienna
INCIDENT PROCESSING STATS Summary (mw/phishing) 2010 12-17 June 2011 Vienna
Destination geographic distribution City MW Phishing Moscow 3054 (47.07%) 191 (12%) St. Petersburg 609 (9.38%) 22 (1.4%) 12-17 June 2011 Vienna
Difficulties (technical) • Incorrect information in RIPE database • Small net objects often not listed in database • AS ’ s ownership often can ’ t be discovered without ISP support (VPN) 12-17 June 2011 Vienna
Effectiveness Not easy to estimate – but performance index is positive because of: • We have a lot of established contacts with ISPs/domain registrars • Better chance to find out correct contacts (5-6 calls chain is normal) • Requests coming from a Russian organization are usually treated in a more friendly manner 12-17 June 2011 Vienna
Questions ganev@cert.ru, info@cert.ru http://www.cert.ru/ 12-17 June 2011 Vienna
Recommend
More recommend